Personensuche
X
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
1
Certifiably Vulnerable: Using Certificate Transparency Logs..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
2
Shimware: Toward Practical Security Retrofitting for Monoli..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
3
Container Orchestration Honeypot: Observing Attacks in the ..:
, In:
?
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) ,
4
Columbus: Android App Testing Through Systematic Callback E..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
5
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Gu..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
6
TEEzz: Fuzzing Trusted Applications on COTS Android Devices:
, In:
?
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) ,
7
Venomave: Targeted Poisoning Against Speech Recognition:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
8
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs i..:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
9
SYMBEXCEL: Automated Analysis and Understanding of Maliciou..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
10
Understanding Security Issues in the NFT Ecosystem:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
11
HEAPSTER: Analyzing the Security of Dynamic Allocators for ..:
, In:
?
Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia Security ,
12
Looking for Signals: A Systems Security Perspective:
, In:
?
Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science ,
13
Hybrid Pruning: Towards Precise Pointer and Taint Analysis:
, In:
?
2022 IEEE Symposium on Security and Privacy (SP) ,
14
DEEPCASE: Semi-Supervised Contextual Analysis of Security E..:
, In:
?
Proceedings of the 38th Annual Computer Security Applications Conference ,
15